Quiz CISSP, Certified Information Systems Security Professional (update September 5th,2013)
The length of an MD5 message digest is:
Which of the following is not a proprietary encryption algorithm?
A public key infrastructure (PKI) does not include:
which is not a weakness of symmetric cryptography?
Which of the following characteristics are part of the DES encryption scheme?
The most secure form of triple-DES encryption is:
A _____________________ binds a subject name to a public key value.
A digital certificate:
which of the following is less likely to be used?
Which of the following is included in an X.509-certificate?